{"id":3474,"date":"2013-02-27T13:27:52","date_gmt":"2013-02-27T13:27:52","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3474"},"modified":"2013-02-28T21:50:29","modified_gmt":"2013-02-28T21:50:29","slug":"arpwner-arp-dns-poisoning-attack-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2013\/02\/arpwner-arp-dns-poisoning-attack-tool\/","title":{"rendered":"ARPwner – ARP & DNS Poisoning Attack Tool"},"content":{"rendered":"
ARPwner is a tool to do ARP poisoning and DNS poisoning attacks, with a simple GUI and a plugin system to do filtering of the information gathered, also has a implementation of sslstrip and is coded 100% in python and on Github, so you can modify according to your needs.<\/p>\n
<\/p>\n
This tool was released by Nicolas Trippar at BlackHat USA 2012.<\/p>\n
For the tool to work you need pypcap, so assuming are using a Debian derivative OS (like all sane people do) – you’ll need to do this first:<\/p>\n
[sh]apt-get install python-pypcap[\/sh]<\/p>\n
You can download ARPwner here:<\/p>\n